Almost everyone who has worked with DBs have heard about indexing. We often do indexing to improve the performance of our applications.
But how many of us know exactly how indexing works?
You might be wondering why you need to know how it works, right?
Because only when you know something inside out, can you use it to its full capabilities.
Before moving on to the high level concepts, let’s take some time to go through the fundamental structure behind indexing — a B-Tree.
What happens when you type a domain name in your browser?
We all know that computers understand only IP addresses and not domain names, so how are domain names mapped to IP addresses?
Most people would know that there is a process of DNS resolution involved which converts a domain name to an IP address, but how does that exactly work?
This post will cover each step involved in the resolution of a domain name into it’s corresponding IP address.
If this isn’t the first time you are visiting a website, there are chances that your browser has cached the…
Have you ever encountered a situation where you want to check if someone (or maybe you) modified a stored procedure or not?
Or maybe you want to see a list of all the most recently modified stored procedures. How do you do this?
Well, you can have this data without any instrumentation or any SQL Server tool. This information is stored in the SQL database itself.
Here are some SQL Queries that you might find useful
SELECT name, create_date, modify_date
WHERE type = 'P'
ORDER BY modify_date DESC
SELECT TOP 10 name, create_date, modify_date
If you actively monitor your security hub score, chances are that you know about how tricky things can get.
Recently a new check for encrypting SNS topics at rest was added to security hub. As a result, I faced some strange issues.
I followed these steps to resolve the broken notifications but this led to me failing another security check.
Chances are that you’ll fail KMS.1 or KMS.2 of AWS foundational best practices if you follow the approach above.
Because you are giving permissions to wildcard (*) for KMS actions!
The first approach that came to my mind was…
In this post, I’ll be referring to MS SQL Server as SQL Server
A lot of times the SQL Server uses a lot of resources causing strange CPU spikes.
Though these are meant to be there so that SQL server can provide more optimized performance, they can be a bottleneck if we see a long spike or continuous spikes.
We therefore need to figure out what query is responsible so that we can then optimize it.
To figure this out, you need to follow the following steps
Many times we have a requirement where we want databases on two different servers to have same data, procs, etc.
For example, we want that the data in our stage environment should be same as our dev environment so that we can work on that data without much worry for the environment.
In such scenarios, either we can have a separate stored procedure to do so or we can do this manually using SSMS.
Here we will see how to do it manually using SSMS. …
Anyone who has ever had to work with an antivirus will agree to the fact that they eat up a lot of resources (read that as CPU)
Same is the case with ClamAV
But we can however increase the size of our boxes (EC2 instances in case of AWS) to compensate for the CPU utilization.
But what if the spikes in CPU causes the functionality of the main app to suffer?
This is a common issue that you will face while setting up a NextCloud installation with ClamAV integrated.
Though there is a feature for having external servers, there is…
Almost all of us use separate environments for separate needs like dev, UAT, production, etc.
And we most probably have separate regions for separate environments to isolate them completely.
But many a times we need to have production data on our lower environments to test some functionality or see the actual effects of our actions.
In this post, we’ll be going through the process of synchronizing two separate WordPress environments.
To begin with, there are three major components of any wordpress application
Code base should be maintained via GitHub (so we won’t…
Recently I set up a cloudwatch alarm to receive notifications via mail and on a slack channel. But even after 3 days there were no alarms triggered.
This could mean one of the following things
To confirm which of the above are true, I went see the cloudwatch alarm. The alarm clearly showed that it had been triggered once daily, but I’ve not received any alerts for it.
It also gave a glimpse of…
Deploying on cloud is very very different as compared to traditional IT infrastructures. In cloud, your deployments no longer remain hardware devices, but rather become programmable services.
This provides you with a lot of flexibility and fault tolerance. But has it ever occurred to you what if you wanted to have an infrastructure copied?
Yes, the entire infrastructure!
Or, you want to maintain a version control on your infrastructure. Obviously it’s possible as it has now become nothing more than a collection of various services.
Well, the above advantages and many more requirements are satisfied when you think of your…